A Secure Computing Platform for Building Automation Using Microkernel-based Operating Systems
暂无分享,去创建一个
[1] Gernot Heiser,et al. From L3 to seL4 what have we learnt in 20 years of L4 microkernels? , 2013, SOSP.
[2] Gernot Heiser,et al. Correct, fast, maintainable: choose any three! , 2012, APSys.
[3] Elaine J. Weyuker,et al. The distribution of faults in a large industrial software system , 2002, ISSTA '02.
[4] Gernot Heiser,et al. The role of virtualization in embedded systems , 2008, IIES '08.
[5] Kari Burman,et al. Net Zero Energy Military Installations: A Guide to Assessment and Planning , 2010 .
[6] Gregory D. Koblentz. Biosecurity Reconsidered: Calibrating Biological Threats and Responses , 2010, International Security.
[7] Wolfgang Granzer,et al. Security in Building Automation Systems , 2010, IEEE Transactions on Industrial Electronics.
[8] Udo Steinberg,et al. NOVA: a microhypervisor-based secure virtualization architecture , 2010, EuroSys '10.
[9] Adam Lackorzynski,et al. Demo Abstract: Timing Aware Hardware Virtualization on the L4Re Microkernel Systems , 2016, 2016 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS).
[10] Carl Staelin,et al. lmbench: Portable Tools for Performance Analysis , 1996, USENIX Annual Technical Conference.
[11] Peter Palensky,et al. Software security requirements in building automation , 2016, Sicherheit.
[12] Mordechai Guri,et al. HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System , 2017, ArXiv.
[13] D. T. Hitchings. Laboratory space pressurization control systems , 1994 .
[14] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[15] Irfan Habib,et al. Virtualization with KVM , 2008 .
[16] Gerwin Klein,et al. capDL: a language for describing capability-based systems , 2010, APSys '10.
[17] John Buford,et al. Phone virtualization using a microkernel hypervisor , 2009, 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA).
[18] Jochen Liedtke,et al. The performance of μ-kernel-based systems , 1997, SOSP.
[19] Gernot Heiser,et al. Camkes: a Component Model for Secure Microkernel-based Emebedded Systems , 2007 .
[20] Igor Nai Fovino,et al. A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems , 2011, IEEE Transactions on Industrial Informatics.
[21] Michael G. Apte,et al. Indoor carbon dioxide concentrations and sick building syndrome symptoms in the BASE study revisited: Analyses of the 100 building dataset , 2002 .
[22] Jesús María Molina Terriza,et al. LEARN HOW TO CONTROL EVERY ROOM AT A LUXURY HOTEL REMOTELY: THE DANGERS OF INSECURE HOME AUTOMATION DEPLOYMENT , 2014 .
[23] Richard Habeeb,et al. Improving the Security of Building Automation Systems Through an seL4-based Communication Framework , 2018 .
[24] John Rushby. A Trusted Computing Base for Embedded Systems , 1984 .
[25] Trent Jaeger. Operating System Security , 2008, Operating System Security.
[26] Bill McCarty,et al. Selinux: NSA's Open Source Security Enhanced Linux , 2004 .
[27] Zhong Shao,et al. CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels , 2016, OSDI.
[28] Per Brinch Hansen,et al. The nucleus of a multiprogramming system , 1970, CACM.
[29] Kevin Elphinstone,et al. Experience report: seL4: formally verifying a high-performance microkernel , 2009, ICFP.
[30] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[31] Gernot Heiser,et al. The Jury Is In: Monolithic OS Design Is Flawed: Microkernel-based Designs Improve Security , 2018, APSys.
[32] Timothy Grance,et al. Guide to Supervisory Control and Data Acquisition (SCADA) and Other Industrial Control System Security , 2006 .
[33] Gernot Heiser,et al. The OKL4 microvisor: convergence point of microkernels and hypervisors , 2010, APSys '10.
[34] Asif Iqbal,et al. An Overview of Microkernel , Hypervisor and Microvisor Virtualization Approaches for Embedded Systems , 2010 .
[35] Ole Agesen,et al. A comparison of software and hardware techniques for x86 virtualization , 2006, ASPLOS XII.
[36] Gerwin Klein,et al. Towards verified virtual memory in L4 , 2004 .
[37] Hermann Merz,et al. Building Automation: Communication systems with EIB/KNX, LON and BACnet , 2009 .
[38] Herbert Bos,et al. Can we make operating systems reliable and secure? , 2006, Computer.
[39] Dan Hildebrand,et al. An Architectural Overview of QNX , 1992, USENIX Workshop on Microkernels and Other Kernel Architectures.
[40] Dragan Peraković,et al. Analysis of the IoT impact on volume of DDoS attacks , 2015 .
[41] Adam Lackorzynski,et al. L 4 Linux Porting Optimizations , 2004 .
[42] W. Granzer,et al. Security in networked building automation systems , 2006, 2006 IEEE International Workshop on Factory Communication Systems.
[43] Stefan Axelsson,et al. The base-rate fallacy and its implications for the difficulty of intrusion detection , 1999, CCS '99.
[44] Michael Roitzsch,et al. Ten Years of Research on L 4-Based Real-Time Systems , 2006 .
[45] Michael Norrish,et al. seL4: formal verification of an OS kernel , 2009, SOSP '09.
[46] David G. Holmberg,et al. BACnet wide area network security threat assessment , 2011 .
[47] Sang-Bum Suh,et al. Xen on ARM: System Virtualization Using Xen Hypervisor for ARM-Based Secure Mobile Phones , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.
[48] Dietmar Loy,et al. Open control networks: LonWorks/EIA 709 technology , 2001 .
[49] Scott Shenker,et al. Overcoming the Internet impasse through virtualization , 2005, Computer.
[50] Xiaolong Wang,et al. Enhanced Security of Building Automation Systems Through Microkernel-Based Controller Platforms , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems Workshops (ICDCSW).
[51] Yuval Elovici,et al. Securing Android-Powered Mobile Devices Using SELinux , 2010, IEEE Security & Privacy.
[52] Jochen Liedtke,et al. On micro-kernel construction , 1995, SOSP.
[53] James D. Mooney. Bringing Portability to the Software Process , 2000 .
[54] Joseph G. Allen,et al. Associations of Cognitive Function Scores with Carbon Dioxide, Ventilation, and Volatile Organic Compound Exposures in Office Workers: A Controlled Exposure Study of Green and Conventional Office Environments , 2015, Environmental health perspectives.
[55] Xiaolong Wang,et al. Secure RTOS Architecture for Building Automation , 2015, CPS-SPC@CCS.
[56] Kim Zetter,et al. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon , 2014 .
[57] Ralph Langner. To Kill a Centrifuge A Technical Analysis of What Stuxnet ’ s Creators Tried to Achieve , 2013 .
[58] Gernot Heiser,et al. Hardware-supported virtualization on ARM , 2011, APSys.
[59] Stamatis Karnouskos,et al. Stuxnet worm impact on industrial cyber-physical system security , 2011, IECON 2011 - 37th Annual Conference of the IEEE Industrial Electronics Society.
[60] Wolfgang Granzer,et al. Securing IP backbones in building automation networks , 2009, 2009 7th IEEE International Conference on Industrial Informatics.